Sei sulla pagina 1di 2

Assignment blocks

Follow the layout below to address the requirement(s) for this assessment. A clear justification on
the weighting is given as well as a clear marking scheme for the objectives fulfilment and grade
allocation.


Description
1. 1. Write a clear narrative on AES describing its transformations and its data structure
in details. Report the history of AES, the version of the cipher and explain why there
are different versions. Discuss the implementation of AES in hardware and in software
and discuss the trade off of the code size and its performances. Discuss the existent
attacks on AES comment on its cryptographic resistance. Find out if there has been
any new recent attack on AES. Use the appropriate references in your report.
2. 2. Write a report on the coding of the transformations in AES implemented in Matlab.
3. 3. Write a clear narrative on 2 applications of AES including comments on the
hardware/software implementation of the cipher and on the mode implementation of
AES for the applications chosen. Discuss what the role of AES in the chosen
applications is. Use the appropriate references in your report.


Weight





30%



30%


40%







Write a report of a total 1500 words (+-10%).

The report must be submitted including all blocks in the same document (each student
should submit one document only). An electronic submission is also required on BREO
(Follow the Turnitin submission link). All students must aware that the University policy
does not allow multiple submissions of assessments therefore your first submission will be
treated as the final.
REPORT STRUCTURE

Your report may follow the layout below: (This is optional). You might want to choose your layout
and you are free to do so, as long as it presents your finding(s) in a coherent and professional
manner.

1. 1. AES description
a. a. What is AES: its transformations and its data structure
b. b. History of AES
c. c. AES in hardware and software and trades of code size and its performance in
speed
d. d. AES: Attacks

a. 2. AES implementation in Matlab
b. a. Matlab functions used to implement AES
c. b. Code and comments on the code line by line
d. 3. Two Applications of AES
e. a. Description of application 1
f. b. Description of application 2
g. c. Role of AES and its implementation in application 1
d. Role of AES and its implementation in application 2

Potrebbero piacerti anche